US Patent No: 7,318,235

Number of patents in Portfolio can not be more than 2000

Attestation using both fixed token and portable token

ALSO PUBLISHED AS: 20040117625

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

Methods, apparatus and machine readable medium are described for creating and using protected key blobs that require a particular portable token be present before use of the key or keys of the protected key blob is granted. Such protected key blobs may be used to establish a level of trust between a local user and the computing device.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Related Publications

Loading Related Publications... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTEL CORPORATIONSANTA CLARA, CA25825

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Grawrock, David W Aloha, OR 95 745

Cited Art Landscape

Patent Info (Count) # Cites Year
 
INTEL CORPORATION (34)
5,075,842 Disabling tag bit recognition and allowing privileged operations to occur in an object-oriented memory protection mechanism 121 1989
5,455,909 Microprocessor with operation capture facility 97 1992
5,386,552 Preservation of a computer system processing state in a mass storage device 198 1994
5,568,552 Method for providing a roving software license from one node to another node 416 1995
5,805,712 Apparatus and method for providing secured communications 268 1995
5,835,594 Methods and apparatus for preventing unauthorized write access to a protected non-volatile storage 150 1996
5,729,760 System for providing first type access to register if processor in first mode and second type access to register if processor not in first mode 127 1996
5,844,986 Secure BIOS 277 1996
5,937,063 Secure boot 202 1996
5,852,717 Performance optimizations for computer networks utilizing HTTP 273 1996
5,757,919 Cryptographically protected paging subsystem 216 1996
5,978,481 Modem compatible method and apparatus for encrypting data that is transparent to software applications 100 1997
6,058,478 Apparatus and method for a vetted field upgrade 125 1997
6,175,925 Tamper resistant player for scrambled contents 128 1997
6,178,509 Tamper resistant methods and apparatus 140 1997
6,205,550 Tamper resistant methods and apparatus 138 1997
6,357,004 System and method for ensuring integrity throughout post-processing 118 1997
6,249,872 Method and apparatus for increasing security against unauthorized write access to a protected memory 104 1998
6,192,455 Apparatus and method for preventing access to SMRAM space through AGP addressing 119 1998
6,173,417 Initializing and restarting operating systems 155 1998
6,115,816 Optimized security functionality in an electronic system 131 1998
2002/0004,900 METHOD FOR SECURE ANONYMOUS COMMUNICATION 73 1998
6,463,535 System and method for verifying the integrity and authorization of software before execution in a local platform 193 1998
6,282,650 Secure public digital watermark 169 1999
6,389,537 Platform and method for assuring integrity of trusted agent communications 218 1999
6,633,981 Electronic system and method for controlling access through user authentication 120 1999
6,535,988 System for detecting over-clocking uses a reference signal thereafter preventing over-clocking by reducing clock rate 109 1999
6,507,904 Executing isolated mode instructions in a secure system running in privilege rings 133 2000
6,633,963 Controlling access to multiple memory zones in an isolated execution environment 141 2000
6,678,825 Controlling access to multiple isolated memories in an isolated execution environment 92 2000
2003/0002,668 Multi-level, multi-dimensional content protections 21 2001
2003/0126,453 Processor supporting execution of an authenticated code instruction 84 2001
7,028,149 System and method for resetting a platform configuration register 40 2002
7,165,181 System and method for establishing trust without revealing identity 22 2002
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (18)
4,207,609 Method and means for path independent device reservation and reconnection in a multi-CPU and shared device access system 244 1978
4,366,537 Authorization mechanism for transfer of program control or data between different address spaces having different storage protect keys 130 1980
4,843,541 Logical resource partitioning of a data processing system 294 1987
5,230,069 Apparatus and method for providing private and shared access to host address and data spaces by guest programs in a virtual machine computer system 125 1990
5,237,616 Secure computer system having privileged and unprivileged memories 112 1992
5,317,705 Apparatus and method for TLB purge reduction in a multi-level machine system 142 1993
5,555,385 Allocation of address spaces within virtual machine compute system 154 1993
5,564,040 Method and apparatus for providing a server function in a logically partitioned hardware machine 185 1994
5,560,013 Method of using a target processor to execute programs of a source architecture that uses multiple address spaces 181 1994
5,555,414 Multiprocessing system including gating of host I/O and external enablement to guest enablement at polling intervals 127 1994
5,628,023 Virtual storage computer system having methods and apparatus for providing token-controlled access to protected pages of memory via a token-accessible view 54 1994
5,764,969 Method and system for enhanced management operation utilizing intermixed user level and supervisory level instructions with partial concept synchronization 98 1995
5,809,546 Method for managing I/O buffers in shared storage by structuring buffer table having entries including storage keys for controlling accesses to the buffers 93 1996
6,175,924 Method and apparatus for protecting application data in secure storage areas 140 1997
5,956,408 Apparatus and method for secure distribution of data 162 1998
6,615,278 Cross-platform program, system, and method having a global registry object for mapping registry equivalent functions in an OS/2 operating system environment 94 1999
2002/0133,701 Method for tracing traitor receivers in a broadcast encryption system 7 2001
2002/0129,261 Apparatus and method for encrypting and decrypting data recorded on portable cryptographic tokens 15 2001
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (9)
5,319,760 Translation buffer for virtual machines with address space match 156 1991
5,421,006 Method and apparatus for assessing integrity of computer system software 457 1994
5,668,971 Posted disk read operations performed by signalling a disk read complete to the system prior to completion of data transfer 111 1996
6,055,637 System and method for accessing enterprise-wide resources by presenting to the resource a temporary credential 359 1996
6,061,794 System and method for performing secure device communications in a peer-to-peer bus architecture 246 1997
6,378,072 Cryptographic system 223 1998
6,125,430 Virtual memory allocation in a virtual address space having an inaccessible gap 143 1998
6,275,933 Security system for a computerized apparatus 98 1999
6,988,250 Trusted computing platform using a trusted device assembly 47 2000
 
HITACHI, LTD. (7)
4,975,836 Virtual computer system 113 1985
4,802,084 Address translator 104 1986
5,187,802 Virtual machine system with vitual machine resetting store indicating that virtual machine processed interrupt without virtual machine control program intervention 99 1989
5,295,251 Method of accessing multiple virtual address spaces and computer system 93 1990
5,506,975 Virtual machine I/O interrupt control method compares number of pending I/O interrupt conditions for non-running virtual machines with predetermined number 123 1993
5,628,022 Microcomputer with programmable ROM 98 1994
5,504,922 Virtual machine with hardware display controllers for base and target machines 106 1994
 
MICROSOFT CORPORATION (7)
4,974,159 Method of transferring control in a multitasking computer system 57 1988
5,815,665 System and method for providing trusted brokering services over a distributed network 655 1996
6,473,800 Declarative permission requests in a computer system 202 1998
6,327,652 Loading and identifying a digital rights management operating system 424 1999
6,330,670 Digital rights management operating system 453 1999
6,609,199 Method and apparatus for authenticating an open system application to a portable IC device 182 1999
6,651,171 Secure execution of program code 144 1999
 
SUN MICROSYSTEMS, INC. (5)
5,255,379 Method for automatically transitioning from V86 mode to protected mode in a computer system using an Intel 80386 or 80486 processor 149 1990
5,935,242 Method and apparatus for initializing a device 130 1996
5,987,557 Method and apparatus for implementing hardware protection domains in a system with no memory management unit (MMU) 154 1997
6,035,374 Method of executing coded instructions in a multiprocessor having shared execution resources including active, nap, and sleep states in accordance with cache miss latency 97 1997
6,131,166 System and method for cross-platform application level power management 150 1999
 
AKAMAI TECHNOLOGIES, INC. (4)
2009/0132,648 CONTENT DELIVERY AND GLOBAL TRAFFIC MANAGEMENT NETWORK SYSTEM 26 2009
2009/0132,648 CONTENT DELIVERY AND GLOBAL TRAFFIC MANAGEMENT NETWORK SYSTEM 26 2009
2009/0132,648 CONTENT DELIVERY AND GLOBAL TRAFFIC MANAGEMENT NETWORK SYSTEM 26 2009
2009/0132,648 CONTENT DELIVERY AND GLOBAL TRAFFIC MANAGEMENT NETWORK SYSTEM 26 2009
 
CP8 TECHNOLOGIES (3)
4,795,893 Security device prohibiting the function of an electronic data processing unit after a first cutoff of its electrical power 95 1987
5,293,424 Secure memory card 238 1992
5,479,509 Method for signature of an information processing file, and apparatus for implementing it 215 1994
 
GLOBALFOUNDRIES INC. (3)
6,093,213 Flexible implementation of a system management mode (SMM) in a processor 100 1996
6,044,478 Cache with finely granular locked-down regions 150 1997
2002/0147,916 Method and apparatus for securing portions of memory 90 2001
 
LENOVO (SINGAPORE) PTE LTD. (3)
5,022,077 Apparatus and method for preventing unauthorized access to BIOS in a personal computer system 192 1989
6,684,326 Method and system for authenticated boot operations in a computer system of a networked computing environment 115 1999
2002/0169,717 System and method for installing a remote credit card authorization on a system with a TCPA complaint chipset 81 2001
 
ADVANCED MICRO DEVICES, INC. (2)
6,421,702 Interrupt driven isochronous task scheduler system 98 1998
6,499,123 Method and apparatus for debugging an integrated circuit 149 2000
 
ATI TECHNOLOGIES ULC (2)
6,321,314 Method and apparatus for restricting memory access 158 1999
6,397,379 Recording in a program execution profile references to a memory-mapped active device 177 1999
 
Codex Technologies, Inc. (2)
6,463,537 Modified computer motherboard security and identification system 163 1999
2003/0018,892 Computer with a modified north bridge, security engine and smart card having a secure boot capability and method for secure booting a computer 124 2001
 
Entrust Technologies Limited (2)
6,393,565 Data management system and method for a limited capacity cryptographic storage unit 29 1998
6,363,485 Multi-factor biometric authenticating device and method 178 1998
 
GREENLIANT LLC (2)
6,339,815 Microcontroller system having allocation circuitry to selectively allocate and/or hide portions of a program memory address space 151 1998
6,505,279 Microcontroller system having security circuitry to selectively lock portions of a program memory address space 98 1998
 
INTELLECTUAL VENTURES II LLC (2)
5,615,263 Dual purpose security architecture with protected internal operating system 190 1995
6,188,257 Power-on-reset logic with secure power down capability 97 1999
 
MITSUBISHI DENKI KABUSHIKI KAISHA (2)
5,706,469 Data processing system controlling bus access to an arbitrary sized memory area 89 1995
6,101,584 Computer system and semiconductor device on one chip including a memory and central processing unit for making interlock access to the memory 100 1997
 
SCHNEIDER AUTOMATION INC. (2)
4,276,594 Digital computer with multi-processor capability utilizing intelligent composite memory and input/output modules and method for performing the same 194 1978
4,307,447 Programmable controller 149 1979
 
ZERO-KNOWLEDGE SYSTEMS INTERNATIONAL, INC. (2)
5,606,617 Secret-key certificates 207 1994
5,604,805 Privacy-protected transfer of electronic information 119 1996
 
ABSOLUTE SOFTWARE CORPORATION (1)
6,269,392 Method and apparatus to monitor and locate an electronic device using a secured intelligent agent 169 1997
 
ACCENTURE GLOBAL SERVICES LIMITED (1)
6,529,909 Method for translating an object attribute converter in an information services patterns environment 419 1999
 
ACTIVCARD (1)
2003/0005,317 Method and system for generating and verifying a key protection certificate 15 2001
 
Amdahl Corporation (1)
5,574,936 Access control mechanism controlling access to and logical purging of access register translation lookaside buffer (ALB) in a computer system 104 1995
 
APPLE INC. (1)
5,752,046 Power management system for computer device interconnection bus 130 1996
 
BIOSCRYPT INC. (1)
5,790,668 Method and apparatus for securely handling data in a database of biometrics and associated data 78 1995
 
BOZAK INVESTMENTS, LLC (1)
5,459,867 Kernels, description tables, and device drivers 202 1993
 
BROWN, DOUGLAS G. (1)
5,944,821 Secure software registration and integrity assessment in a computer system 246 1996
 
BT COUNTERPANE INTERNET SECURITY, INC. (1)
5,978,475 Event auditing system 198 1997
 
CERTCO, INC. (1)
5,825,880 Multi-step digital signature method and system 223 1997
 
CEVA IRELAND LIMITED (1)
6,282,651 Security system protecting data with an encryption key 101 1999
 
CISCO TECHNOLOGY, INC. (1)
6,560,627 Mutual exclusion at the record level with priority inheritance for embedded systems using one semaphore 89 1999
 
DALLAS SEMICONDUCTOR CORPORATION (1)
4,278,837 Crypto microprocessor for executing enciphered programs 463 1979
 
Dell USA, L.P. (1)
5,657,445 Apparatus and method for limiting access to mass storage devices in a computer system 164 1996
 
DEUTSCHE TELEKOM AG (1)
6,222,923 Method for securing system protected by a key hierarchy 113 1997
 
DIGITAL EQUIPMENT CORPORATION (1)
4,319,323 Communications device for data processing system 120 1980
 
DISK TECHNICIAN CORPORATION (1)
5,287,363 System for locating and anticipating data storage media failures 131 1991
 
EMC CORPORATION (1)
5,633,929 Cryptographic key escrow system having reduced vulnerability to harvesting attacks 116 1995
 
ETA TECHNOLOGIES CORPORATION (1)
5,727,061 Personal access management systems 21 1995
 
FREESCALE SEMICONDUCTOR, INC. (1)
5,737,760 Microcontroller with security logic circuit which prevents reading of internal memory by external program 160 1995
 
FUJITSU LIMITED (1)
5,361,375 Virtual computer system having input/output interrupt control of virtual machines 124 1993
 
FUJITSU SIEMENS COMPUTERS GMBH (1)
6,339,816 Method for improving controllability in data processing system with address translation 100 2000
 
HELBIG, WALTER A., SR. (1)
5,953,502 Method and apparatus for enhancing computer system security 197 1997
 
HITACHI MICROCOMPUTER ENGINEERING LTD. (1)
4,571,672 Access control method for multiprocessor systems 139 1983
 
IDENTIX INCORPORATED (1)
2001/0027,527 Secure transaction system 185 2001
 
INFOSPACE, INC. (1)
4,529,870 Cryptographic identification, financial transaction, and credential device 415 1982
 
INTARSIA SOFTWARE LLC (1)
6,741,991 Data management system 42 2001
 
INTEGRATED TECHNOLOGOES OF AMERICA, INC. (1)
6,351,813 Access control/crypto system 201 1998
 
INTELLECTUAL VENTURE FUNDING LLC (1)
6,199,152 Translated memory protection apparatus for an advanced microprocessor 146 1996
 
KABUSHIKI KAISHA TOSHIBA (1)
5,890,189 Memory management and protection system for virtual memory in computer system 144 1996
 
KELLY SERVICES, INC. (1)
5,007,082 Computer software encryption apparatus 167 1990
 
KINGLITE HOLDINGS INC. (1)
6,557,104 Method and apparatus for secure processing of cryptographic keys 229 1997
 
KOKUSAN DENKI CO., LTD. (1)
4,319,233 Device for electrically detecting a liquid level 84 1979
 
LEVADA, VICTOR (1)
6,085,296 Sharing memory pages and page tables among computer processes 158 1997
 
LUCENT TECHNOLOGIES INC. (1)
5,740,178 Software for controlling a reliable backup memory 86 1996
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (1)
5,796,845 Sound field and sound image control apparatus and method 106 1997
 
MCAFEE, INC. (1)
5,459,869 Method for providing protected mode services for device drivers and other resident software 127 1994
 
MCGOUGH, PAUL (1)
6,445,797 Method and system for performing secure electronic digital streaming 132 1998
 
MICROCHIP TECHNOLOGY INCORPORATED (1)
5,469,557 Code protection in microcontroller with EEPROM fuses 112 1993
 
MICRON TECHNOLOGY, INC. (1)
5,970,147 System and method for configuring and registering a cryptographic device 174 1997
 
MICROSEMI SEMICONDUCTOR (U.S.) INC. (1)
5,901,225 System and method for performing software patches in embedded systems 131 1996
 
N.star-solid.Able Technologies, Inc. (1)
6,138,239 Method and system for authenticating and utilizing secure resources in a computer system 87 1998
 
NATIONAL SEMICONDUCTOR CORPORATION (1)
5,684,948 Memory management circuit which provides simulated privilege levels 104 1995
 
NCR CORPORATION (1)
4,403,283 Extended memory system and method 125 1980
 
NIKON CORPORATION (1)
6,252,650 Exposure apparatus, output control method for energy source, laser device using the control method, and method of producing microdevice 100 2000
 
NORTHROP GRUMMAN SYSTEMS CORPORATION (1)
2003/0115,468 Assignment of user certificates/private keys in token enabled public key infrastructure system 46 2001
 
NOVELL INTELLECTUAL PROPERTY HOLDINGS, INC. (1)
5,919,257 Networked workstation intrusion detection system 318 1997
 
NOVELPOINT SECURITY LLC (1)
6,212,635 Network security system allowing access and modification to a security subsystem after initial installation when a master token is in place 225 1998
 
OPEN INVENTION NETWORK, LLC (1)
5,935,247 Computer system having a genetic code that cannot be directly accessed and a method of maintaining the same 89 1997
 
PANTAURUS LLC (1)
6,272,533 Secure computer system and method of providing secure access to a computer system including a stand alone switch operable to inhibit data corruption on a storage device 138 1999
 
PARKER-HANNIFIN CORPORATION (1)
5,473,692 Roving software license for a hardware agent 545 1994
 
PURE FILL CORPORATION (1)
5,582,717 Water dispenser with side by side filling-stations 134 1993
 
Real Time, Inc. (1)
6,412,035 Apparatus and method for decreasing the response times of interrupt service routines 112 1998
 
RENESAS ELECTRONICS CORPORATION (1)
5,872,994 Flash memory incorporating microcomputer having on-board writing function 180 1996
 
Rhone-Poulenc Industries (1)
4,217,444 Method of degassing polymers prepared by mass polymerizing a monomeric composition based on vinyl chloride 68 1978
 
ROBERT BOSCH GMBH (1)
4,430,709 Apparatus for safeguarding data entered into a microprocessor 97 1981
 
ROCKWELL COLLINS, INC. (1)
6,374,286 Real time processor capable of concurrently running multiple independent JAVA machines 300 1998
 
SAFENET, INC. (1)
6,282,657 Kernel mode protection 124 1998
 
SAMSUNG ELECTRONICS CO., LTD. (1)
5,717,903 Method and appartus for emulating a peripheral device to allow device driver development before availability of the peripheral device 121 1995
 
SCSK CORPORATION (1)
6,301,646 Pointer verification system and method 100 1999
 
SEIKO EPSON CORPORATION (1)
6,088,262 Semiconductor device and electronic equipment having a non-volatile memory with a security function 108 1998
 
SHIELDIP, INC. (1)
2004/0133,803 Methods and apparatus for protecting information 3 2003
 
SILICON GRAPHICS INTERNATIONAL, CORP. (1)
6,148,379 System, method and computer program product for page sharing between fault-isolated cells in a distributed shared memory system 106 1997
 
SILICON STORAGE TECHNOLOGY, INC. (1)
6,292,874 Memory management method and apparatus for partitioning homogeneous memory and restricting access of installed applications to predetermined memory ranges 158 1999
 
Silicon Systems Design Ltd. (1)
6,014,745 Protection for customer programs (EPROM) 109 1997
 
SMART LINK LTD. (1)
6,092,095 Real-time task manager for a personal computer 149 1996
 
Sperry Corporation (1)
4,419,724 Main bus interface package 95 1980
 
STMICROELECTRONICS S.A. (1)
7,133,990 System and method for controlling access to protected data stored in a storage unit 19 2002
 
SUMITOMO BANK OF NEW YORK TRUST COMPANY (1)
6,378,068 Suspend/resume capability for a protected mode microprocesser 178 1995
 
TENNECO AUTOMOTIVE OPERATING COMPANY INC. (1)
6,158,546 Straight through muffler with conically-ended output passage 114 1999
 
TEXAS INSTRUMENTS INCORPORATED (1)
4,521,852 Data processing device formed on a single semiconductor substrate having secure memory 120 1982
 
The United States of America as represented by the Secretary of the Navy (1)
6,108,644 System and method for electronic transactions 168 1998
 
Tokyo Shibaura Denki Kabushiki Kaisha (1)
4,621,318 Multiprocessor system having mutual exclusion control function 72 1983
 
TREND MICRO INCORPORATED (1)
5,680,547 Method and apparatus for controlling network and workstation access prior to workstation boot 156 1995
 
UTMC MICROELECTRONIC SYSTEMS INC. (1)
5,079,737 Memory management unit for the MIL-STD 1750 bus 100 1988
 
VAN DETSAN NETWORKS LIMITED LIABILITY COMPANY (1)
4,759,064 Blind unanticipated signature systems 245 1985
 
VMWARE, INC. (1)
6,496,847 System and method for virtualizing computer systems 285 1998
 
XEROX CORPORATION (1)
2003/0231,328 Multiple printer driver 50 2002
 
Other [Check patent profile for assignment information] (2)
6,473,508 Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys 25 1998
2001/0037,450 System and method for process protection 171 2001

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
III HOLDINGS 1, LLC (5)
7,571,472 Methods and apparatus for credential validation 4 2002
7,454,622 Method and system for modular authentication and session management 13 2002
8,291,228 Method and system for modular authentication and session management 0 2008
8,474,025 Methods and apparatus for credential validation 0 2009
8,819,416 Method and system for modular authentication and session management 0 2012
 
MICROSOFT CORPORATION (3)
7,891,008 Profile protection 7 2005
8,761,400 Hardware linked product key 0 2005
8,620,818 Activation system architecture 1 2007
 
INTEL CORPORATION (2)
7,480,806 Multi-token seal and unseal 7 2002
7,809,957 Trusted platform module for generating sealed data 6 2005
 
JPMORGAN CHASE BANK, N.A. (2)
8,190,893 Portable security transaction protocol 3 2004
8,583,928 Portable security transaction protocol 0 2012
 
SYMANTEC CORPORATION (2)
8,087,074 One time password 3 2005
8,434,138 One time password 0 2011
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (1)
8,090,939 Digital certificate that indicates a parameter of an associated cryptographic token 3 2005
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (1)
8,112,628 Using a portable computing device as a smart key device 0 2009
 
NOKIA CORPORATION (1)
7,913,086 Method for remote message attestation in a communication system 3 2007

Maintenance Fees

Fee Large entity fee small entity fee micro entity fee due date
7.5 Year Payment $3600.00 $1800.00 $900.00 Jul 8, 2015
11.5 Year Payment $7400.00 $3700.00 $1850.00 Jul 8, 2019
Fee Large entity fee small entity fee micro entity fee
Surcharge - 7.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge - 11.5 year - Late payment within 6 months $160.00 $80.00 $40.00
Surcharge after expiration - Late payment is unavoidable $700.00 $350.00 $175.00
Surcharge after expiration - Late payment is unintentional $1,640.00 $820.00 $410.00